Considering they expressly stated before it was released that they KNEW the vuln, and that it wouldnt be fixed. id say no. or as i was saying to someone the other day if someone puts out some like 5$-10$ wireless ipv6 crash tool that skids can walk around starbucks knocking everyone off the network it will get fixed. But until it becomes a mass issue(note im not saying this isnt a massive flaw! just that its not being used en-mass) it will remain unpatched.
It techinically can be patched by the individual disabling IPv6, but it is automatically set ON when purchased and used. And the chances that you're tech savvy enough to bother disabling it and knowing of the attack is very slim. Opening a wide range of damage in a lot of environments.
But disabling it will only make the computer not crash, the router will still go down. And the "good" thing is that you'll need to be on the same access point to perform the attack. That's why I prefer deauthentication method better.
This, in theory, could become a big issue. It can be used in important places such as banks or hotels, etc. This is if you're assholy enough to attack people on vacation at a hotel.